Novel Encryption Method of GPS Information in Image File Using - - PowerPoint PPT Presentation

novel encryption method of gps information in image file
SMART_READER_LITE
LIVE PREVIEW

Novel Encryption Method of GPS Information in Image File Using - - PowerPoint PPT Presentation

Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk (


slide-1
SLIDE 1

Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk (上海交大)

Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption

slide-2
SLIDE 2

TABLE OF CONTENTS

02 05 03 06

STATE OF THE ART CONCLUSION BACKGROUND

01

EXPERIMENTS

04

INTRODUCTION RESULTS

slide-3
SLIDE 3

BACKGROUND 01

slide-4
SLIDE 4

Background

Format-Preserving Encryption (FPE) Exchangeable Image File Format (EXIF) No other existing proposals for encrypting EXIF Global Positioning System (GPS) Privacy

slide-5
SLIDE 5

INTRODUCTION 02

slide-6
SLIDE 6

Measuring GPS in Smartphones

A-GPS Cell-ID Wi-Fi P-Cell

Synchronize GPS satellite position and current time by 3G or 4G communication networks 3G or 4G signals received from base station Signal of wireless router identifying location Builds database based on information in surrounding environment and compares to information received from device

slide-7
SLIDE 7

EXIF

Where longitude / latitude / direction / altitude How smartphone, camera, etc Data Travels

Across devices, software, etc

Photo storage services

Google images, WeChat Moments, Weibo, Facebook, Instagram ( Some services strip EXIF data )

When date time stamps

slide-8
SLIDE 8

“Can be a gold mine of information”

—SOMEONE FAMOUS

slide-9
SLIDE 9

Format-Preserving Encryption

  • Encrypt plaintext with values of same format

○ Vulnerable to codebook attack if plaintext is short

  • Defense

○ Tweaking, Cycle-walking, Ranking ■ Tweak is additional input values to make up for short plaintext ■ Cycle-walking is Vulnerable to side-channel attacks ■ P-NP problems can’t effjciently apply Ranking

  • Thus, FPE is not used in this paper’s proposal
slide-10
SLIDE 10

STATE OF THE ART 03

slide-11
SLIDE 11

FE1 Algorithm

Calculation of L and R values - R is entered in round function along with key, tweak, and corresponding # of rounds Round function algorithms: HMAC and AES. Calculate XOR with L. Then attach to existing value R. Unbalanced Feistel Network - divide plain into unequal lengths

slide-12
SLIDE 12

Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot—even hotter than Mercury—and its atmosphere is extremely poisonous. It’s the second-brightest natural object in the night sky after the Moon

VISION

12

Design of GPS Encryption using FE1

Encryption Process shown below is the same as Decryption Process

slide-13
SLIDE 13

EXPERIMENTS 04

slide-14
SLIDE 14
slide-15
SLIDE 15

Exceed Google Map Range Value (Intended) Real Location Searched on Google Maps

slide-16
SLIDE 16

RESULTS 05

Here you could describe the topic of the section

slide-17
SLIDE 17

Discussion of Results

Time Complexity: n^2 SPECS: CPU I5-8500 Windows 10

slide-18
SLIDE 18

Discussion of Results

Triangle = EXIF GPS data found Circle = EXIF GPS data not found

slide-19
SLIDE 19

CONCLUSION 06

slide-20
SLIDE 20

Conclusion and Potential

5,408 Followers 5,408 Followers 5,608 Views 608 Followers 5,608 Likes 5,608 Followers

AGE

  • Novel Encryption Approach

○ Lack of Defense ○ Lack of Significant Experimentation ○ Area is capable for further research

  • EXIF GPS implications

○ Treasure cove of data is stored in photos ■ If a photo service is hacked, a lot of personal information can be more exposed than intended

slide-21
SLIDE 21

谢谢~